We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Security Solutions.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Security Solutions×サブゲート - List of Manufacturers, Suppliers, Companies and Products

Security Solutions Product List

1~5 item / All 5 items

Displayed results

Security solution 'SubGate'

A security solution that enables intuitive network operations.

"SubGate" is a network internal security solution that automatically detects and blocks security threats occurring within the network, enhancing the stability of network services and the convenience of operations. It protects the network with patented technology from Special Patent 2011-523822, "Access Level Security Device and Security System." The MDS engine performs traffic analysis based on behavior, automatically detecting and blocking harmful traffic without degrading switch performance. [Features] - Patented technology for access level network security - Dedicated engine for harmful traffic analysis (MDS Engine) - Selection and blocking of harmful traffic to prevent its spread - Simple security settings - Perfect compatibility with other switches, etc. *For more details, please download the PDF or contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Things to Address in 2022 [Security Measures]

We will introduce the key points of issues that require strengthened measures and security switches!

In preparation for the day when measures to prevent the spread of viruses become even more essential, we would like to introduce the actions to be taken in 2022. Key points for strengthening measures include the "amendment of the Personal Information Protection Act," the "amendment of the Electronic Bookkeeping Act," and "measures for telework PCs." Our security switch, 'SubGate,' allows for easy internal measures. It is suitable for preventing the spread of computer viruses, detecting and blocking harmful traffic, and preventing eavesdropping on internal IP phones and confidential data. [Key Points for Strengthening Measures] ■ Amendment of the Personal Information Protection Act Stricter reporting (mandatory), two types of reports (preliminary and final) ■ Amendment of the Electronic Bookkeeping Act Changes in storage methods, security of storage locations ■ Measures for Telework PCs Home cluster, censorship during internal connections *For more details, please refer to the PDF document or feel free to contact us.

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

<Security Measures> Introducing measures to prevent the spread of viruses.

What should we do against increasingly sophisticated cyber attacks? Introducing measures to prevent the spread of viruses!

We are offering a document summarizing the security measures implemented by SubGate Inc. It includes "Things to Address in 2022," "Security Measures for 2022," and "Necessary Actions for Supply Chain Attack Prevention," among other virus prevention measures. Our security switch, 'SubGate,' protects your network. Please feel free to download and take a look. [Offered Documents] ■ Things to Address in 2022 ■ Security Measures for 2022 ■ Necessary Actions for Supply Chain Attack Prevention ■ [Horror Newspaper] True Scary Stories, Episode 1 ■ [Horror Newspaper] True Scary Stories, Episode 2 *For more details, please refer to the PDF document or feel free to contact us.

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The savior of supply chain attack measures! Highly effective security measures!

In recent times, it has become impossible to completely prevent infections from Emotet ransomware. Stopping the spread and minimizing secondary damage with 【SubGate】 is an effective measure!

The high-performance security switch SubGate series and SubGateX series are equipped with the internationally patented proprietary security ASIC known as the MDS engine in all models. At the same time, it reports to the administrator via email from the management software VNM, allowing for awareness of infections and enabling proactive measures upstream. In today's world, where infections from Emotet and ransomware cannot be completely prevented, it has become difficult to protect the internal network from clusters solely through individual management efforts, especially with the risk of infections from a single internal PC or easy connections to the internal LAN from PCs brought back unknowingly from remote work locations. By simply replacing the currently used HUB with a SubGate, you can prevent the spread of viruses, block harmful traffic such as internal DoS attacks, and prevent eavesdropping on IP phone conversations and theft of confidential data. For wireless LAN environments, there are security access points SubGate AP and WiFi6 compatible security access points SubGateAPX. Additionally, SubGateX supports multi-gigabit connections. With the highly effective SubGate series, you can strengthen internal measures based on the premise of potential infections.

  • Routers, Switches, and Hubs

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Basic Knowledge: Security Measures in 2022

We are introducing how to prevent sophisticated cyber attacks and what should be done!

We introduce security measures for 2022 on how to deal with increasingly sophisticated cyber attacks such as EMOTET, ransomware, and supply chain attacks. We cover topics including "What is EMOTET?", "Attack methods", and "Examples of attacks on major manufacturing supply chains". Additionally, we introduce 'SubGate', which helps prevent the spread of viruses. Please make use of these measures. 【Contents (partial)】 ■ What is EMOTET ■ Attack methods ■ Scary features ■ Symptoms after infection ■ Damage after infection *For more details, please refer to the PDF document or feel free to contact us.

  • Routers, Switches, and Hubs
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration